Tatvam Cloud Solutions, LLP

Security & Trust

We handle review data, customer information, and merchant integrations for thousands of stores. This page covers what we actually do to keep that data safe.

Last Updated: March 2026

Security at a Glance

Security DomainWhat We Do
Encryption in TransitTLS 1.2+ on all endpoints: API, dashboard, widget delivery
Encryption at RestAES-256 encryption on all databases (MongoDB Atlas) and file storage (Azure Blob, AWS S3)
AuthenticationJWT token-based API auth, OAuth 2.0 for platform integrations, bcrypt password hashing
Access ControlRole-Based Access Control (RBAC) with Admin, Editor, and Viewer roles per workspace
DDoS & WAF ProtectionCloudflare Web Application Firewall with DDoS mitigation across all services
InfrastructureMicrosoft Azure App Services with auto-scaling, Docker container isolation
CDN & PerformanceCloudflare CDN with 300+ global edge locations for widget delivery
Payment SecurityNo credit card data touches our servers. Billing is handled by Chargebee (PCI DSS Level 1)
Email SecurityAWS SES with DKIM/SPF domain verification for authenticated email delivery
MonitoringReal-time error tracking (Sentry), Slack alerts, health-check endpoints
Data IsolationMulti-tenant architecture with workspace-level logical data separation
CI/CDGitHub Actions with encrypted secrets vault. No plaintext credentials in pipelines

Infrastructure Provider Certifications

Our infrastructure runs on cloud providers that hold their own compliance certifications. These cover the physical, network, and platform layers below our application.

ProviderRoleCertifications
Microsoft AzureHosting, compute, storage, message queuingSOC 1/2/3, ISO 27001, ISO 27018, GDPR, HIPAA, PCI DSS
MongoDB AtlasPrimary databaseSOC 2, ISO 27001, HIPAA, PCI DSS, GDPR
CloudflareCDN, WAF, DDoS protectionSOC 2, ISO 27001, PCI DSS, GDPR
AWS (SES/S3)Email delivery, file storageSOC 1/2/3, ISO 27001, PCI DSS, GDPR, HIPAA
ChargebeeBilling & subscriptionsPCI DSS Level 1, SOC 2, GDPR

Our Compliance Roadmap

SOC 2 Type II

On Roadmap

Our controls map to SOC 2 Trust Service Criteria today. Formal certification is planned and we share our control mapping on request.

ISO 27001

On Roadmap

We follow security management practices aligned with ISO 27001 Annex A. Certification is on our roadmap.

Penetration Testing

Planning

We are planning to bring in a third-party security firm for a formal penetration test. Results will be shared with enterprise customers on request.

Security Governance

Security responsibilities are embedded into engineering roles at WiserReview, not siloed into a separate department. At 15 people, this means direct accountability and fast decision-making.

RolePersonSecurity Responsibilities
Security OfficerSecurity LeadershipOverall ownership of the security program; final decision authority on security matters; policy sign-off; breach notification
Engineering LeadSenior EngineerInfrastructure security; CI/CD pipeline security; production access controls; Azure, MongoDB Atlas, Cloudflare configuration; code review oversight
Development TeamAll DevelopersSecure coding practices; participating in code reviews; following this policy; reporting security concerns promptly
All EmployeesEntire TeamAdherence to this policy and all sub-policies; protecting access credentials; reporting suspicious activity; completing security awareness sessions

Risk Management

WiserReview takes a pragmatic, risk-based approach to information security. The Engineering Lead and Security Officer jointly assess risks and implement controls proportionate to impact.

Risk CategoryPrimary Controls
Unauthorized data accessJWT auth, RBAC, client-scoped queries, MongoDB Atlas IP whitelisting
Data breach or exfiltrationTLS 1.2+ in transit, AES-256 at rest, container isolation, Cloudflare WAF
Service disruption or DDoSCloudflare L3/L4/L7 DDoS protection, Azure auto-scaling, 99.95% SLA
Credential compromisebcrypt hashing (cost 12), OAuth 2.0, no plaintext credentials, GitHub secrets vault
Supply chain or dependency attacksDocker pinned dependencies, multi-stage builds, Azure Container Registry
Insider threatLeast-privilege access, no direct production SSH, audit trails

Detailed Documentation

Security Inquiries

For security inquiries or documentation requests:

Tatvam Cloud Solutions, LLP

[email protected]